Analysis
-
max time kernel
145s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
11/06/2024, 02:48
Static task
static1
Behavioral task
behavioral1
Sample
9cc45c70e8f716e21014193c787293c0_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9cc45c70e8f716e21014193c787293c0_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
9cc45c70e8f716e21014193c787293c0_JaffaCakes118.html
-
Size
28KB
-
MD5
9cc45c70e8f716e21014193c787293c0
-
SHA1
4acdcf7e6b914964a340ed7c5d23aed0a5b9de0b
-
SHA256
ab0cb84980bfe6a5c6e831e93ecfec778ac37b72e39fc22753220c898bcdd74e
-
SHA512
22eec92b9a8d794bd7fbec1fc55351b2cf7f12433c2d25c0863b9ecd7ee070dc6614f2c4709fd35a20a8eeb7ccc80b3ad9177f82e7bf798b1576c28a696c3e9e
-
SSDEEP
768:w9Fljx/sVYxFEXqwqbHy4M9e5mBqSuDl4LYFH:w9Fljx/qYxFEXqwqbHy4M0ato4LYFH
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3608 msedge.exe 3608 msedge.exe 3492 msedge.exe 3492 msedge.exe 768 identity_helper.exe 768 identity_helper.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3492 wrote to memory of 4540 3492 msedge.exe 85 PID 3492 wrote to memory of 4540 3492 msedge.exe 85 PID 3492 wrote to memory of 1448 3492 msedge.exe 86 PID 3492 wrote to memory of 1448 3492 msedge.exe 86 PID 3492 wrote to memory of 1448 3492 msedge.exe 86 PID 3492 wrote to memory of 1448 3492 msedge.exe 86 PID 3492 wrote to memory of 1448 3492 msedge.exe 86 PID 3492 wrote to memory of 1448 3492 msedge.exe 86 PID 3492 wrote to memory of 1448 3492 msedge.exe 86 PID 3492 wrote to memory of 1448 3492 msedge.exe 86 PID 3492 wrote to memory of 1448 3492 msedge.exe 86 PID 3492 wrote to memory of 1448 3492 msedge.exe 86 PID 3492 wrote to memory of 1448 3492 msedge.exe 86 PID 3492 wrote to memory of 1448 3492 msedge.exe 86 PID 3492 wrote to memory of 1448 3492 msedge.exe 86 PID 3492 wrote to memory of 1448 3492 msedge.exe 86 PID 3492 wrote to memory of 1448 3492 msedge.exe 86 PID 3492 wrote to memory of 1448 3492 msedge.exe 86 PID 3492 wrote to memory of 1448 3492 msedge.exe 86 PID 3492 wrote to memory of 1448 3492 msedge.exe 86 PID 3492 wrote to memory of 1448 3492 msedge.exe 86 PID 3492 wrote to memory of 1448 3492 msedge.exe 86 PID 3492 wrote to memory of 1448 3492 msedge.exe 86 PID 3492 wrote to memory of 1448 3492 msedge.exe 86 PID 3492 wrote to memory of 1448 3492 msedge.exe 86 PID 3492 wrote to memory of 1448 3492 msedge.exe 86 PID 3492 wrote to memory of 1448 3492 msedge.exe 86 PID 3492 wrote to memory of 1448 3492 msedge.exe 86 PID 3492 wrote to memory of 1448 3492 msedge.exe 86 PID 3492 wrote to memory of 1448 3492 msedge.exe 86 PID 3492 wrote to memory of 1448 3492 msedge.exe 86 PID 3492 wrote to memory of 1448 3492 msedge.exe 86 PID 3492 wrote to memory of 1448 3492 msedge.exe 86 PID 3492 wrote to memory of 1448 3492 msedge.exe 86 PID 3492 wrote to memory of 1448 3492 msedge.exe 86 PID 3492 wrote to memory of 1448 3492 msedge.exe 86 PID 3492 wrote to memory of 1448 3492 msedge.exe 86 PID 3492 wrote to memory of 1448 3492 msedge.exe 86 PID 3492 wrote to memory of 1448 3492 msedge.exe 86 PID 3492 wrote to memory of 1448 3492 msedge.exe 86 PID 3492 wrote to memory of 1448 3492 msedge.exe 86 PID 3492 wrote to memory of 1448 3492 msedge.exe 86 PID 3492 wrote to memory of 3608 3492 msedge.exe 87 PID 3492 wrote to memory of 3608 3492 msedge.exe 87 PID 3492 wrote to memory of 3676 3492 msedge.exe 88 PID 3492 wrote to memory of 3676 3492 msedge.exe 88 PID 3492 wrote to memory of 3676 3492 msedge.exe 88 PID 3492 wrote to memory of 3676 3492 msedge.exe 88 PID 3492 wrote to memory of 3676 3492 msedge.exe 88 PID 3492 wrote to memory of 3676 3492 msedge.exe 88 PID 3492 wrote to memory of 3676 3492 msedge.exe 88 PID 3492 wrote to memory of 3676 3492 msedge.exe 88 PID 3492 wrote to memory of 3676 3492 msedge.exe 88 PID 3492 wrote to memory of 3676 3492 msedge.exe 88 PID 3492 wrote to memory of 3676 3492 msedge.exe 88 PID 3492 wrote to memory of 3676 3492 msedge.exe 88 PID 3492 wrote to memory of 3676 3492 msedge.exe 88 PID 3492 wrote to memory of 3676 3492 msedge.exe 88 PID 3492 wrote to memory of 3676 3492 msedge.exe 88 PID 3492 wrote to memory of 3676 3492 msedge.exe 88 PID 3492 wrote to memory of 3676 3492 msedge.exe 88 PID 3492 wrote to memory of 3676 3492 msedge.exe 88 PID 3492 wrote to memory of 3676 3492 msedge.exe 88 PID 3492 wrote to memory of 3676 3492 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\9cc45c70e8f716e21014193c787293c0_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3492 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd150d46f8,0x7ffd150d4708,0x7ffd150d47182⤵PID:4540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2192,15294436105359851948,15224220233875094406,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2208 /prefetch:22⤵PID:1448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2192,15294436105359851948,15224220233875094406,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2272 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2192,15294436105359851948,15224220233875094406,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2968 /prefetch:82⤵PID:3676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,15294436105359851948,15224220233875094406,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:8
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,15294436105359851948,15224220233875094406,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:2896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,15294436105359851948,15224220233875094406,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4744 /prefetch:12⤵PID:4212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,15294436105359851948,15224220233875094406,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5192 /prefetch:12⤵PID:1456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,15294436105359851948,15224220233875094406,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5356 /prefetch:12⤵PID:4880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2192,15294436105359851948,15224220233875094406,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6216 /prefetch:82⤵PID:5032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2192,15294436105359851948,15224220233875094406,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6216 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,15294436105359851948,15224220233875094406,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6284 /prefetch:12⤵PID:3900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,15294436105359851948,15224220233875094406,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5580 /prefetch:12⤵PID:3228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,15294436105359851948,15224220233875094406,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5404 /prefetch:12⤵PID:336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,15294436105359851948,15224220233875094406,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5392 /prefetch:12⤵PID:4072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2192,15294436105359851948,15224220233875094406,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6376 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3436
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3928
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:212
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54f7152bc5a1a715ef481e37d1c791959
SHA1c8a1ed674c62ae4f45519f90a8cc5a81eff3a6d7
SHA256704dd4f98d8ca34ec421f23ba1891b178c23c14b3301e4655efc5c02d356c2bc
SHA5122e6b02ca35d76a655a17a5f3e9dbd8d7517c7dae24f0095c7350eb9e7bdf9e1256a7009aa8878f96c89d1ea4fe5323a41f72b8c551806dda62880d7ff231ff5c
-
Filesize
152B
MD5ea98e583ad99df195d29aa066204ab56
SHA1f89398664af0179641aa0138b337097b617cb2db
SHA256a7abb51435909fa2d75c6f2ff5c69a93d4a0ab276ed579e7d8733b2a63ffbee6
SHA512e109be3466e653e5d310b3e402e1626298b09205d223722a82344dd78504f3c33e1e24e8402a02f38cd2c9c50d96a303ce4846bea5a583423937ab018cd5782f
-
Filesize
23KB
MD5e1c71f7c04be834f5587230db2ad24b3
SHA1f3bab9cb99d9f343bf7ed3981aaa7450515d2424
SHA2569fb6c768068467b58cc773a3907f3f5ec170bfe02ca8f301f6a232a9daf5a899
SHA512205366b4a3ca0dae58722a19ba24088dd8db483db9d14b376434024b064715ade720347ff5de87db014e32d2ef8192e71bbbdd3c885d5a8581b4aafc6e88ce51
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize192B
MD59736c71fa9f56086b64c16fdcead256a
SHA1a20fcc20545ec63ecd4508994c0bfd2b84bc09c1
SHA256cb191d9273d3f95ab4c525462473549addf514e30f41a2e4fb8ffe5973d64d6d
SHA512fc84e8a73de979584faa17ab232894a34787ad4bc790e9d5f0631e2a3dd6d57dfe08daf6409d5dde52663b35bb60ddf81560bf1f0170b7e96a6420c7dd0eea19
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD54f58b61a8a214890ff260ae1cc10b2f4
SHA1b8346ff86f09199a3a51dcb4525a2e629f3fb152
SHA25674030669ebc7f75cf145395c4522f41f5742c62a0799f0f14609d5e3edd78c99
SHA5120a96be2e2aba29ed7116825940ff006217d28ad1a92c98a324576432e44dcdeb01e34b8115ee39c315b13822e224440f4b1296b2a1ec1054452a3a4306c20230
-
Filesize
1KB
MD5df31277094f986b2e38f493c78a427cc
SHA127c74656cd90d9ecb53431bc10f4cdbc2e88ae0b
SHA2569cd4007575b1fd3f311c12eda509c56c053ebe803b11c029ac58fa2fbc6764cf
SHA51250b372c0ab6a34e2f5a71150d50651356b70a50e751454b6f086044243698662ba9d4863be0d324ce8ed5d06c1c52b5f21884de9f3b9ea10c189b2d27a0cd89d
-
Filesize
7KB
MD5661e6044673a00bce11e4d72cae1dc5e
SHA126ada3811afa21de08f0d6ed664f18b78bcd9b8f
SHA2560cdaa20c679dd4a4758a2376d1916a46059169b70171df4b7abb24f9f58b2ed7
SHA512cc244a2ddcac6e1db4b62f607808bca9676e89547cb827a27416a6c6d0c5b0bae5dbc69476dea80e71fad54630f05a1b58a0f2dc4f5d94d24086a845463b85d5
-
Filesize
6KB
MD5117d45c9edfc9e2d8fedb035be377bc9
SHA10239c56923dc0aa724c7cef5f21416609669b476
SHA256e96920e6d18e739fe51eeab8af5017ccc02b4a519839e2edaad34ed9cd886fc0
SHA51295a4718d5133986d3d50048f76cf778d91ee199653063c44bebe67d51619cb62daf61ae5dca530d553f4f66a25b342527a45a74ff379739baff20edc26ff2727
-
Filesize
6KB
MD514b4e9327b42e1af0aa69ec5c8164759
SHA1d087c3d04dc8197d88bf5cd28bbe0574acebb85a
SHA2567fc9366e9b231b4b97eb41acb9ea2c4266a337988c5c1f59037de1a3ccc7b1d2
SHA512219a0c48d3be3a3de990087ffe81c770b78259e598bef76132e5eefc9da5ab9d3a18382184538cdad4655e730642bf9e29810e91833d1c7f656ae5a7b9cda152
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5aed5bf4f1c8094f8ea45af9d96857119
SHA1f57d41603dd91343d1e0beff69aaf49574ac35c2
SHA2563dc0811f4f7a2ef3a00b890bee07932498dd8b916414a47c2840fe5e52c15e46
SHA51233be229b20b7e6b5bcccfd8b5c954fc4ac88589de3acc91ac49a96210d1e64a11d9c17535bc14559c9ec8183da972cf216e028fe5cc1e7ba6e0d70a42612ec3b